Threats to information security Types of Security Problems?. Threats to information security • Denial-of-service attacks intentional... Threats to information security - Loss of Infrast
Trang 1Lecture 11: Information Security
Management Nga.lethiquynh@ueh.edu.vn http://mis.ueh.edu.vn/blog/
Trang 2Q4 What data safeguards are available?
Q5 What human safeguards are available?
Q6 How should organizations respond to
security Incidents?
Trang 3Q1: What are the threats
to information security?
Trang 4Threats to information security
Sources of Threats?
human error and mistakes:
accidental problems caused by both employees and nonemployees
poorly written application programs and poorly designed procedures
physical accidents
malicious human activity
employees and former employees who intentionally destroy data
Hackers
natural events and disasters
fires, floods, hurricanes, earthquakes, tsunamis, avalanches, and other acts of nature
Trang 5Threats to information security
Types of Security Problems?
Source: Textbook [1], page 409
Trang 6 Unauthorized Data Disclosure
Pretexting: when someone deceives by pretending to be
someone else
Phishing: uses pretexting via email
Spoofing: another term for someone pretending to be someone else
IP spoofing: occurs when an intruder uses another site’s IP address as
if it were that other site
Email spoofing: a synonym for phishing
Drive-by sniffers: take computers with wireless connections through an area and search for unprotected wireless networks
Threats to information security
Trang 7 Incorrect Data Modification
Procedures incorrectly designed or not followed
Increasing a customer’s discount or incorrectly modifying employee’s salary
Placing incorrect data on company the Web site
Improper internal controls on systems
System errors
Faulty recovery actions after a disaster
Threats to information security
Trang 8Threats to information security
• Denial-of-service attacks (intentional)
Trang 9Threats to information security - Loss of
Infrastructure
• Human accidents.
• Theft and terrorist events.
• Disgruntled or terminated employee.
• Natural disasters.
• Advanced Persistent Threat (APT)
Sophisticated, possibly long-running
computer hack perpetrated by large,
well-funded organizations
Trang 10What Are the Components of an
Organization’s Security Program?
3 components
senior-management involvement
establish the security policy
manage risk by balancing the costs and benefits
of the security program
Safeguards: protections against security
threats
organization’s planned response to security
incidents
Trang 11Security Safeguards
Source: Textbook [1], page 411
Trang 12Q2: What is senior
management’s security role?
Trang 13Senior management’s security role
What sensitive data the organization will store.
How it will process that data.
Whether data will be shared with other
organizations.
How employees and others can obtain copies of data
stored about them.
How employees and others can request changes to
inaccurate data.
What employees can do with their own mobile
devices at work
…
Trang 14 determine what safeguards
Risk-Management Decisions : decide what to do
Risk Assessment Factors Source: textbook [1], page 415
Senior management’s security role
Trang 15Q3 What technical
safeguards are available?
Trang 16Technical safeguards
Source: Textbook [1], page 418
Trang 17Essence of https (SSL or TLS)
Source: Textbook [1], page 422
Trang 18Digital Signatures
Source: Textbook [1], page 423
Trang 19Malware Protection
replicates itself
Trojan horses are viruses that masquerade
as useful programs or files
the Internet or other computer network
Spyware programs are installed on the
user’s computer without the user’s
Trang 20Malware Protection
1. Antivirus and antispyware programs.
2. Scan frequently.
3. Update malware definitions.
4. Open email attachments only from
known sources.
5. Install software updates.
6. Browse only reputable Internet
neighborhoods.
Trang 21Q4 What data safeguards
are available?
Trang 22Data safeguards
Source: Textbook [1], page 427
Trang 23Q5 What human
safeguards are available?
Trang 24Human safeguards
Source: Textbook [1], page 429
Trang 25Account Administration
Account Management
➢ Standards for new user accounts,
modification of account permissions, and
removal of accounts that are not needed
Trang 26Sample Account Acknowledgment
Form
Source: Textbook [1], page 431
Trang 27Systems Procedures
Source: Textbook [1], page 432
Trang 28Q6 How should organizations
respond to security Incidents?
Trang 29How should organizations respond to
security Incidents?
Source: Textbook [1], page 435
Trang 30Q4 What data safeguards are available?
Q5 What human safeguards are available?
Q6 How should organizations respond to
security Incidents?
Trang 31Additional Resources
2017-Ransomeware ‘WannaCry’ attack
explained
2017-Impact of WannaCry